Tải bản đầy đủ (.pdf) (59 trang)

Tài liệu Designing Cisco network Service Architectures (ARCH) docx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (575.92 KB, 59 trang )




Exam: 642-871

Title : Designing Cisco network Service Architectures
(ARCH)
Ver : 04.12.04
642-871
Actualtests.com - The Power of Knowing

Note: Section A contains 74 questions. Section B contains 267
questions. The total number of questions is 341.


Section A


QUESTION 1 A good Enterprise Campus network must have the ability to cope with user number, data and
application increases. What does one call this ability to expand to support increasing capabilities?
A. Functionality
B. Performance
C. Scalability
D. Administration
E. Expandability
Answer: C
The ability of a campus network to expand so as to accommodate more users and resources is referred to as
scalability.

QUESTION 2 Which of the following is the last step that needs to be done in the Enterprise Campus Design
Methodology?


A. Design the physical network.
B. Determining the correct amount of users.
C. Select the different routing protocols to be used.
D. Design the edge distribution module.
E. Characterize applications.
F. Determine the data and application requirements.
G. Select an IP addressing strategy and numbering scheme.
Answer: D
Reference: Cisco Systems Inc. course material, pages 2-10 and 2-11

QUESTION 3 Note: The following 3 questions all refer to the scenario below: The company Certkiller
manufactures and imports fasteners like bolts and nuts. The company's network consists of a main campus
composed of three separate building that are less than 150 meters apart, connected with Category 5e copper
wiring. Network access as well as distribution takes place by means of 100 Mbps hubs, and the core is a 100
Mbps Layer-2 switch. The company has been in existence for 8 years and thus development in the network
resulted in a series of steps that involved minimal planning. The only well planned step is the recently
redesigned WAN links. The network is thus plagued by slow response and frequent outages.
� In the Engineering building there's a database server that processed heavy local traffic and keeps the local
network at 70% of bandwidth, currently utilized by the Engineering department.
� The Accounting department makes use of a server located in the Administration building. This particular
department use commercial applications for general ledger, accounts payable, and accounts receivable data and
purposes. In addition to the service this server renders to the Accounts department, it also processes heavy and
light traffic from the other buildings.
� All the other servers are stationed in the information-processing centre.
� All the employees have access to e-mail facilities that are located on a single server in the information-
processing centre.
� There is a web server that was made available for public use.
642-871
Actualtests.com - The Power of Knowing


� There is also an internal web server that is meant for employees. This server carries new items, internal jobs
available, and other human resource applications.
� The external web server is in a new Corporate Internet Module. It is estimated that the internal network
traffic will grow at 10% per annum for the next five years. The manager in charge of IT affairs requested that
you, the network administrator design an up-to-date,of Certkiller, while still keeping costs low because the IT
budget has been reduced. Which recommendations will you make taking into account the parameters given
above? (Choose all that
apply.)
A. Use multi-mode optic fiber to the desktop.
B. Use single mode fiber between buildings.
C. Use multi-mode fiber between buildings.
D. Use existing copper wiring to the desktop.
E. Use existing copper wiring and optic fiber between buildings.
F. All of the above.
Answer: C, D

QUESTION 4 Which location would be the best locale for the device for the Management Module and Server
Farm?
A. In the Administration building.
B. In the Information-processing building.
C. In the Accounting Department in the Administration building
D. In the Engineering building.
E. In all buildings.
Answer: B

QUESTION 6 Your newly appointed Certkiller trainee wants to know which high availability design will
depend more on networks than devices.
What would your reply be?
A. Clustering
B. Token Ring

C. Parallel processing
D. Fault tolerance
E. Redundant topology
F. Tripe modular redundancy
Answer: E

QUESTION 7 How would you define a fault tolerant device?
A. A backup path exists for every link between the client and the server.
B. Key components can be hot-swapped.
C. A backup device exists for every device between the client and the server.
D. Devices in the network can be hot-swapped without interrupting the network operation.
E. The device provides redundant backup within the device for each of its key components.
Answer: A

QUESTION 8 Which of the following characteristics determines the choice of Layer 1 technology for WAN,
remote, or Internet access at the Enterprise Edge? (Choose all that apply.)
642-871
Actualtests.com - The Power of Knowing

A. Scalability.
B. Transportability
C. Loss
D. Layer 2 technology
E. Layer 1 media
F. All of the above.
Answer: C, E

QUESTION 9 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know which
of the following application characteristics are significant and must be taken into account in the Enterprise Edge
design process. What would your reply be? (Choose all that apply.)

A. Database magnitude
B. Delay sensitivity
C. Data content
D. Bandwidth usage
E. Loss tolerance
F. All of the above.
Answer: B, D, E

QUESTION 10 Which of the following is the first step that needs to be done in the Enterprise Design
Methodology?
A. Select a service provider.
B. Determine the data and application requirements.
C. Select an IP addressing strategy and numbering scheme.
D. Characterize applications.
E. Select a Layer 1 technology.
F. Select a Layer 2 technology.
Answer: D

QUESTION 11 When working in the Enterprise Composite Network Model environment, which components
form part of the Enterprise Edge functional area? (Choose all that apply.)
A. WAN module
B. Server farm
D. Access server
E. Internet connectivity
F. Management module
G. VPN/Remote access
H. All of the above.
Answer: A, C, E, G

QUESTION 12 Which of the following components would you most probably encounter in the VPN/Remote

Access module? (Choose all that apply.)
A. ISDN
B. IDS
C. Firewall
D. PSTN
642-871
Actualtests.com - The Power of Knowing

E. Access server
F. All of the above.
Answer: B, C, E

QUESTION 13 When working in a Cisco environment, which of the following models would be utilized when
you connect to a PBX system that uses non-standard signaling?
A. Translate model
B. Cross over model
C. Interprete model
D. Transport model
E. Trans-cross model
Answer: A

QUESTION 14 Which of the following technologies will you implement at the Server Farm Distribution Layer
when you receive an instruction by Certkiller to design and implement a new Server Farm module with high
availability and performance? (Choose all that apply.)
A. Mid-range switches
B. Redundant switching and links with no single paths or points of failure
C. Caching systems where appropriate
D. Server load balancing
E. Redundant firewalls
F. All of the above.

Answer: B, C, D

QUESTION 15 You are the network administrator at Certkiller. The Certkiller network is shown in the
following exhibit:

What is the Certkiller VPN topology as shown in the illustration?
A. Full-mesh VPN
B. Hub-and-spoke VPN
C. Hierarchical VPN
D. Token Ring
E. Private WAN
Answer: B

642-871
Actualtests.com - The Power of Knowing

QUESTION 16 You are contracted as a network administrator for a small newly established company,
Certkiller.com. The network consists of three buildings that are several hundred feet apart that are connected via
fast Ethernet single-mode fiber. 10Mbps hubs with 100Mbps Ethernet uplinks over multi-mode fibers to a
switch in each building provide access to the network. Category 5 wiring connects over 200 users to the hubs.
The CEO of Certkiller wants you to design a new network that will take scalability, performance,
manageability, security and availability into account, while still keeping costs low as the company is still
relatively new. What recommendation regarding wiring infrastructure would you include in your network
design?
A. Install Category 5e copper to the desktop from the wiring closets.
B. Replace the copper wiring with fiber optic cables will save costs over a longer period.
C. Maintain the current wiring structure.
D. Install multi-mode fiber to the desktop from the wiring closets.
E. Replace the multi-mode fiber within the buildings with single-mode fiber-
Answer: C


QUESTION 17 Which aspects are significant when planning a network design for high availability? (Choose
all that apply.)
A. Company size
B. Performance requirements
C. Hardware costs
D. Cost of downtime
E. All of the above.
Answer: A, C

QUESTION 18 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what
the recommended maximum number of users that an individual wireless access point should support is. What
would your reply be?
A. Between 1 and 10
B. Between 10 and 30
C. Between 32 and 48
D. Between 56 and 128
Answer: B

QUESTION 19 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know
which of the following are considerations to using IP Multicast delivery. What would your reply be? (Choose
all that apply.)
A. No congestion avoidance.
B. Low end routers in use.
C. No guaranteed delivery mechanism.
D. Source sends multiple data streams out each interface.
E. Ordered delivery of packets.
F. Not for bandwidth intensive applications.
Answer: C, E


QUESTION 20 Which of the following would you select to keep VLAN design complexity to a minimum?
(Choose one option.)
642-871
Actualtests.com - The Power of Knowing

A. Use campus wide VLANs.
B. Use building distribution level VLANs.
C. Use VLANs in the campus backbone.
D. Use per-switch VLANs at the access layer.
E. Use VLANs in the core.
F. All of the above.
Answer: B
Note: If select two options that apply then choose B, D.

QUESTION 21 Which factors in a business environment will increase the need for remote access? (Choose all
that apply.)
A. The ability to provide a more flexible work environment.
B. The need for authentication.
C. The rising costs of office space.
D. The need for a means of charging back leasing costs.
E. All of the above.
Answer: A, B
Explanation:
A. Having remote users will decrease the need for additional office space.
C. Allowing users to work from home provide a more flexible work environment.
Incorrect.
B. The need for authentication would not suggest a need for remote access.
D. Irrelevant

QUESTION 22 Why is it beneficial to design high availability networks based on a redundant network

topology? (Choose all that apply.)
A. The cost of the network is reduced.
B. Internet connection is obsolete.
C. The traffic load can be shared between primary and secondary paths.
D. Network availability is precarious.
E. Redundant topologies are easier to manage and troubleshoot.
F. The probability of problems with the physical environment interrupting service is reduced.
Answer: C, F

QUESTION 23 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know
which of the following protocols will provide WLAN redundancy and low downtime. What would your reply
be?
A. EAP
B. BRI
C. SNMP
D. HSRP
E. WEP
Answer: D

QUESTION 24 How would you go about delimiting the area coverage of wireless access points in an effort to
provide added security?
642-871
Actualtests.com - The Power of Knowing

A. Lowering Mbps data rates.
B. Increasing Mbps data rates.
C. Configure group access at set intervals.
D. Group access point frequency channels.
E. Enable multicasting.
Answer: B


QUESTION 25 Which of the following will enhance throughput in a wireless LAN? (Choose all that apply.)
A. Use static WEP.
B. Filter multicast traffic.
C. Increase size of roaming domains.
D. Use dynamic WAP
E. Minimize broadcast.
F. Enable IPSec.
Answer: B, E

QUESTION 26 You are contracted as a network administrator for a well established company, Certkiller.com.
Certkiller wants you to design and implement a new Campus Backbone module. It should have multicast and
broadcast control, flexible topology, with no spanning tree loops. Cost effectiveness is a secondary
consideration as money would be no option. What type of equipment would you recommend for use in this
module?
A. Mid-level Layer 2 switches
B. High-level Layer 2 switches
C. High-end routers
D. High-end hubs
E. Layer 3 switches
Answer: B

QUESTION 27 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what
the basic approaches for high-availability design are. What would your reply be? (Choose all that apply.)
A. Redundant Topologies
B. Public bandwidth sharing
C. Fault management.
D. Extremely high MTTR
E. Fault Tolerant Devices
F. Extremely low MTBF

Answer: A, E

QUESTION 28 With which of the following high availability architecture must good software version control
as well as device configuration control be included?
A. Network design
B. Operational best practices
C. Fault tolerance
D. Device-level hardware reliability
E. Fault management and diagnosis
Answer: B
642-871
Actualtests.com - The Power of Knowing


QUESTION 29 Which of the following protocols is able to provide block access to remote storage over WAN
links?
A. SCSI-FP
B. SIP
C. iSCSI
D. FCIP
E. eSCSI
F. CIFS
Answer: C

QUESTION 30 Your newly appointed Certkiller trainee wants to know which of the following is a primary
tool providing perimeter security to a network.
What would your reply be?
A. LAPD
B. Kerberos
C. VPN

D. L2TP
E. Content filter
Answer: C

QUESTION 31 Below is a list of characteristics and applications that can belong to either the SAN or the NAS
storage network model. Can you sort the list by dragging the appropriate option to the correct box on the right?
Drag each option to the appropriate box.

642-871
Actualtests.com - The Power of Knowing

Answer:


QUESTION 32 Which of the following strategies can one employ to provide scalability in the server farm
module?
A. Up to 10 Gbps of bandwidth at the access level.
B. Modular block design at the distribution level.
C. Redundant servers at the access level.
D. Modular block design at the access level.
E. High port densities at the access level.
Answer: D

QUESTION 33 Which VNP management characteristic would you use when you want to make sure that the
network in operation has the least disruption of service when topology changes are made?
A. Auto setup
B. Remote management
C. Dynamic reconfiguration
D. Automatic reconfiguration.
E. Path MTU discovery

Answer: B

QUESTION 34 Under which of the following circumstances would you consider using OSPF to be a viable
choice for use as a routing protocol. (Choose all that apply.)
A. Authentication is required.
B. NBMA connections exist.
C. The network is non-hierarchical.
D. Only internal routes should be considered.
E. Load balancing between multiple routes is required.
F. Fast convergence is necessary.
G. External routes are not an issue.
Answer: A, B, E,

642-871
Actualtests.com - The Power of Knowing

QUESTION 35 What are the features that influence Redundancy requirements of a WAN from a branch office
to a regional office? (Choose all that apply.)
A. Impact if the site is an aggregation point.
B. Impact of the site is non-existent or unavailable.
C. Routing and switching requirements
D. Critical importance of the site and the number of users.
E. All of the above.
Answer: A, D

QUESTION 36 Which of the following characteristics do you need to take into account when analyzing an
application? (Choose all that apply.)
A. Bandwidth, loss tolerance, and delay characteristics
B. Server speed
C. Number of servers and users

D. Application type
E. User's operating system
F. Server operating system
G. All of the above.
Answer: A, D, E

QUESTION 37 Both incoming and outgoing calls for a voice system are governed by rules. Which set of rules
governs the handling of voice system calls?
A. Voice plan
B. Route plan
C. Route pattern
D. Dial pattern
E. Call handler
Answer: C

QUESTION 38 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know
which of the objectives mentioned below meet the requirements for the Server Farm module. What would your
reply be? (Choose all that apply.)
A. Provide availability with overall network design.
B. Provide medium switch port density.
C. Provide remote dial-up access.
D. Provide up to 100 Gbps of outbound capacity.
E. Provide scalability with switches and server load balancing.
F. All of the above.
Answer: A, C, E

QUESTION 39 In which networks would it be the norm to use Static Routing? (Choose all that apply.)
A. Dial-on-demand networks
B. Smaller expanding networks
C. Stub networks

D. Token ring networks.
E. Multi-homed networks
642-871
Actualtests.com - The Power of Knowing

F. Not so stubby network
Answer: B, C

QUESTION 40 Which of the following types of VNP technology is needed when multicast, broadcast and non-
IP packets needs to be tunneled?
A. IPSec
B. GRE
C. Triple-DES
D. IKE
E. None of the above.
Answer: B

QUESTION 41 Which of the following IOS queuing features are recommended at present to use as queuing
method when sending voice traffic?
A. WFQ
B. IO RTP Priority
C. CQ
D. PQ
E. Codec
F. LLQ
Answer: B

QUESTION 42 Which of the following are IOS queuing techniques? (Choose all that apply.)
A. LLQ
B. CAR

C. CQ
D. PQ
E. WFQ
F. NBAR
Answer: A, C, D

QUESTION 43 Which of the following statements best describes the characteristics of a network that is well
designed for QoS?
A. Packets are classified at each router within the network. The classification is based on as many details as
possible, typically using extended IP ACLs to match the packets.
B. Packets are classified based on their position from the hub and the closeness to the router. All the packets are
manually classified based on their positioning and flow of the router.
C. Packets are classified based on socket address, at the router closets to the source of the traffic. The packets
are characterized automatically based on flow at the routers in the middle of the network.
D. Packets are classified and marked, close to the edge of the network. The packets are treated differently based
on this marking at the routers in the middle of the network.
E. Packets are classified based on variable parameters, but close to the edge of the network. The packets are
automatically characterized based on flow at the routers in the middle of the network.
Answer: D

642-871
Actualtests.com - The Power of Knowing

QUESTION 44 Your newly appointed Certkiller trainee wants to know which protocol at Layer 3 can be used
to provide data integrity, privacy, and security on an IP based VPN. What would your reply be?
A. GRE
B. PKI
C. IPSec
D. L2TP
E. Kerberos

F. MD5
Answer: C

QUESTION 45 With which networking technology can you, the network administrator at Certkiller, be assured
that you will be able to provide guaranteed availability of resources to the users for mission-critical, interactive,
and time-sensitive Internet business applications?
A. Resiliency
B. Redundancy
C. QoS
D. Fault tolerance
E. Loss tolerance
F. Load balancing
Answer: C

QUESTION 46 Which of the following symptoms are experienced when one fails to check the LAN/WAN
utilization before implementing a VoIP design?
A. An improper codec selection.
B. The data link being flooded.
C. An echo due to excessive delays.
D. A negative progression in the probability of call blocking
Answer: C

QUESTION 47 You are contracted as a network administrator the company, Certkiller Ltd. Recently you
received complaints by users that they are experiencing performance problems on the company's site-to-site
VPN network. Upon investigating the complaints you find that the VPN connection uses IPSec and GRE and
traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links.What can
be done to address this problem successfully? (Choose all that apply.)
A. Employ path MTU discovery.
B. Set the MTU value to 1400 bytes.
C. Reset the MTU value to lower than 1400 bytes.

D. Set the MTU higher than 1500 bytes.
E. Turn off pre-fragmentation for IPSec.
F. None of the above.
Answer: B, E

QUESTION 48 When selecting a router for an Edge solution, which is the first step that you, the Certkiller
technician, would use Cisco Product Advisor for?
A. To determine the router environment.
B. To select the number of WAN ports required.
642-871
Actualtests.com - The Power of Knowing

C. To determine types of protocols to be supported.
D. To select the appropriate switches.
E. To select the number of LAN ports required.
Answer: B

QUESTION 49 You are the network administrator at Certkiller. Which Cisco Works VPN/Security
Management Solution will you use to gain access to devices and the displays that will show their real-time
status as well as their operational and configuration functions through a web browser?
A. Resource Manager (RME)
B. VPN Monitor
C. Cisco View
D. Omni-vision
E. IDS Host Sensor
Answer: B

QUESTION 50 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know in
which of the following Frame Relay PVC configurations that are able to carry both voice and data, is the
potential voice load better understood and partially isolated from the data load.

What would your reply be?
A. Simplex PVCs
B. Separate PVCs
C. Half Duplex PVCs
D. Duplex PVCs
E. Combined PVCs
Answer: B

QUESTION 51 Your newly appointed Certkiller trainee wants to know which codec you would recommend
for higher quality voice over a data network. What would your reply be?
A. G.711
B. G.714
C. G.726
D. G.729
Answer: A

QUESTION 52 Which of the following will cause Egress Blocking?
A. Packet flooding.
B. Re-transmission of packets blocking all traffic.
C. Large data packets blocking voice packets.
D. Large voice packets blocking data packets.
E. Excessive data fragmentation.
Answer: C

QUESTION 53 Which of the following are characteristic in defining a Campus Backbone submodule? (Choose
all that apply.)
A. Partial mesh generally used to avoid redundant links.
B. Usually, no policy enforcement.
642-871
Actualtests.com - The Power of Knowing


C. Provides high speed, low overhead of low latency switching.
D. Full mesh to allow redundancy.
E. Implements policy-based filtering.
F. Transports aggregate traffic from the other submodules and functional areas.
G. All of the above.
Answer: B, C, F

QUESTION 54 Which of the following would you implement at remote locations for failover purposes when
working in a centralized call-processing model?
A. SNAP
B. SRST
C. CHAP
D. HSRP
E. PSTN
Answer: B

QUESTION 55 Your newly appointed Certkiller trainee wants to know which ATM service class will not
allow delay or loss and is the most appropriate for traffic. What would your reply be?
A. Real Time Variable Bit Rate (rt-VBR)
B. Constant Bit Rate (CBR)
C. Virtual Time Variable Bit Rate (vt-VBR)
D. Available Bit Rate (ABR)
E. Unspecified Bit Rate (UBR)
F. Non-Real Time Bit Rate (nrt-VBR)
Answer: B

QUESTION 56 You are the network administrator at Certkiller. Certkiller has been issued a portion of a Class
C address from their ISP. There are 320 users that will need access to the Internet. The CEO now wants you to
design a network that requires private internal addressing for the users within the company and also requires a

website for external users. Which types of Network Address Translation would you propose? (Choose all that
apply.)
A. Static
B. Overlapping
C. Persistent
D. Dynamic
E. All of the above.
Answer: A, D

QUESTION 57 Which step in new network design, follows after the application and data requirements have
been determined?
A. Design the physical network.
B. Design the logical network.
C. Select the IP addressing strategy and numbering.
D. Setting priorities with regard to IP addressing
E. Select the routing protocols.
Answer: B
642-871
Actualtests.com - The Power of Knowing


QUESTION 58 What is the default setting that the Cisco IP phone employs to set the CoS/ToS value for voice
packets?
A. 1
B. 3
C. 5
D. 7
E. None of the above.
Answer: C


QUESTION 59 Certkiller Ltd. is a medium-sized company with 12 stationary offices and one head office,
where every office is several hundred miles away from the next. You are the network administrator and the
CEO of Certkiller wants you to design a VNP. Considering the scenario, what type of VNP would you design?
A. Enterprise remote access VPN
B. Wireless VPN
C. Remote access VPN
D. Site to site VPN
E. Wide area wireless VNP
Answer: D

QUESTION 60 Which of the following would you use in the CPE to make sure that voice packets are limited
to the Committed Information Rate (CIR) and do not expand beyond the CIR of Frame Relay links?
A. Prioritization
B. Traffic shaping
C. Traffic policing
D. Segmentation
E. Classification
F. Fragmentation
Answer: C

QUESTION 61 Which of the following are functions form part of Web Cache Communication Protocol
(WCCP)? (Choose all that apply.)
A. Fault tolerance
B. Network address translation
C. Load balancing
D. Scalability
E. Remote management
F. Service assurance
G. Redundancy allowance
H. All of the above.

Answer: A, C, D, F

QUESTION 62 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what
the device weight limit per CallManager in a Cisco IP phone configuration would be. What would your reply
be?
A. 800
642-871
Actualtests.com - The Power of Knowing

B. 5000
C. 6500
D. 2500
Answer: B

QUESTION 63 Mentioned below are several tools. Which of them is a web-browser based tool designed to
provide administrative access for content networking?
A. Cisco CallManager
B. Hypertext Administration Design (HAD)
C. Access Point
D. Content Distribution Manager (CDM)
E. Self-Organizing Distributed Architecture (SODA)
F. Web Cache Communication Protocol (WCCP)
Answer: D

QUESTION 64 Cisco has various management tools aimed at various markets. Which of the following Cisco
network management tools is targeted toward small to medium-size business?
A. Netsys
B. CiscoWorks Lite
C. CiscoWorks Standard
D. CiscoWorks Premium

E. CiscoWorks for Windows
Answer: E

QUESTION 65 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know
which device will act as a bridge between a Fiber Channel SAN and an IP network. What would your reply be?
A. Storage Router
B. Switching hub
C. FC-HBA attached host
D. FC Switch
E. NAS GE Switch
Answer: D

QUESTION 66 Which of the following signaling techniques is used amongst CallManager clusters for
intercluster calls?
A. SS7
B. H.323
C. MGCP
D. BRI2
Answer: B

QUESTION 67 You are a technician at Certkiller. You were instructed to place Content Engines on the
Certkiller network. Where would you place it when you are dealing with transparent caching?
A. Close to the servers.
B. Behind the main server.
C. At the Internet edge.
642-871
Actualtests.com - The Power of Knowing

D. In front of web server farms.
E. Close to the end users.

Answer: D

QUESTION 68 What are the design options that will allow network segmentation? (Choose all that apply.)
A. VLANs
B. Token Ring
C. Ethernet Trunking
D. Separate, flat networks
E. Rapid Spanning Tree (RST)
Answer: A, D

QUESTION 69 Bandwidth used by active calls can be delimited by which of the following types of Call
Admission in the Control Manager?
A. Departments
B. Regions
C. Partitions
D. Locations
E. All of the above
Answer: B

QUESTION 70 Your newly appointed Certkiller trainee wants to know which IEEE wireless standard will
allow backward compatibility with 802.11b.
What would your reply be?
A. 802.1q
B. 802.11g
C. 802.11a
D. 802.1g
E. 802.11p
Answer: B

QUESTION 71 You are contracted as a network administrator for a small newly established company,

Certkiller.com. Their network consists of three buildings that are spaced several hundred feet apart. Each
connected via single-mode fiber using fast Ethernet. Access is through 10 Mbps hubs with 100 Mbps Ethernet
uplinks over multi-mode fiber to a switch within each building. The CEO of Certkiller wants you to design a
new network that will take scalability, performance, manageability, security and availability into account, while
still keeping costs low as the company is still relatively new. What recommendation regarding network modules
would you include in your network design?
A. A three-level campus infrastructure model with a low-speed core using Layer 2 switches, a distribution level
using mid-level, Layer 2 switches, and using low-level Layer 2 switches at the access level.
B. A two-level campus infrastructure model with combined high-speed core and distribution layer using high-
speed Layer 3 switches and low-level Layer 2 switches at the access layer.
C. A three-level campus infrastructure model with a intermediate-speed core using Layer 3 switches, a
distribution level using mid-level, Layer 2 switches and using low-level Layer 2 switches at the access level.
D. A two-level campus infrastructure model with combined high-speed core and distribution layer using mid-
642-871
Actualtests.com - The Power of Knowing

level Layer 3 switches and mid-level Layer 2 switches at the access layer.
Answer: B

QUESTION 72 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what
the maximum number of wireless IP phones that can register with an Access point is. What would your reply
be?
A. 3
B. 7
C. 8
D. 57
Answer: B

QUESTION 73 You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what
the maximum number of CallManager servers you can have in a cluster is. What would your reply be?

A. 3
B. 7
C. 8
D. 56
Answer: C

QUESTION 74 When you design the campus network which of the following modules of the Enterprise
Network will you include? (Choose all that apply.)
A. The Campus Core module
B. The Server Farm module
C. The Building Distribution module
D. The Edge Distribution module
E. The Management Module
F. The Divide and conquer module
G. All of the above
Answer: A, B, D
Section B


QUESTION 1 In a Novell environment, it is often a good idea to implement policies controlling resources
access by configuring SAP filters
A. On all routers.
B. On access-layer routers.
C. On distribution-layer routers.
D. On core-layer routers.
Answer: C

QUESTION 2 What does NetBIOS send to identify itself?
A. Unicast.
B. Multicast.

C. Broadcast.
642-871
Actualtests.com - The Power of Knowing

D. SAP advertisement.
Answer: C

QUESTION 3 Which of the following could be considered a "sub area" in the SNA hierarchy?
A. Only Type 2 nodes.
B. Only Type 3 nodes.
C. An FEP with no peripheral devices hanging off it.
D. Peripheral nodes like FEP's.
Answer: C

QUESTION 4 A master domain trusts ______.
A. No one.
B. All other master domains.
C. Only directly-connected master domains.
D. All devices in the domain.
Answer: A

QUESTION 5 What happens after an SNA SSCP-LU and SSCP-PU connection is made?
A. An LU-LU session occurs.
B. An LU-PU session occurs.
C. A PU-PU session occurs.
D. Nothing, because this should never occur.
Answer: A

QUESTION 6 Which of the following is not an RSRB encapsulation protocol?
A. PPP

B. TCP
C. Frame Relay
D. IP FST
E. Direct
F. Local SRB
Answer: A

QUESTION 7 Which is the remote LAN access connectivity method use for a specific purpose (i.e., email)?
A. Remote gateway.
B. Remote control.
C. Remote virtual LAN.
D. Remote node.
Answer: A

QUESTION 8 Of the following routing functions, which has a unique purpose from the others?
A. Hold down.
B. Hot standby.
C. Count-to-infinity.
D. Poison reverse.
Answer: B
642-871
Actualtests.com - The Power of Knowing


QUESTION 9 In a Frame Relay network, what issue occurs due to routing protocols using split horizon?
A. A full mesh topology is required, which requires a lot of configuration.
B. Routers report Frame Relay errors due to routing updates not being forwarded..
C. Connectivity between networks is limited in a partial-mesh.
D. No routing traffic is sent to peer routers.
Answer: C


QUESTION 10 What is the fundamental aspect in a firewall design?
A. Host security.
B. Data compression.
C. Company policy.
D. Access to services.
Answer: C

QUESTION 11 If you turn off the IGRP hold-down timer, you can ______.
A. Reduce the time to detect carrier loss.
B. Introduce problems because of bad routes.
C. Reduce the likelihood of routing loops.
D. Reduce convergence time.
Answer: D

QUESTION 12 When selecting an IP addressing scheme for a client with thousands of nodes you should
______.
A. Use a scheme that will permit classless routing.
B. Use a scheme that will permit mirroring.
C. Use class C addresses.
D. Use a scheme that will permit variable-length subnet masks.
Answer: D
Explanation: VLSM should be used.
Not A: Use a scheme that will permit classless routing" cannot be the answer since whether classless routing is
supported or not is determined by the routing protocol, not by the IP addressing scheme.

QUESTION 13 Which of the following AppleTalk designs is most scalable?
A. AppleTalk Phase 3.
B. AppleTalk Phase 2 implemented everywhere; enhanced IGRP used on WANs and RTMP used on LANs.
C. Use AURP because with AURP only routing table updates are sent.

D. Use RTMP but reduce the time between updates.
Answer: B

QUESTION 14 A hierarchical mesh design for non-broadcast multi-access X.25 and Frame Relay ______.
A. Does not use full-mesh design techniques.
B. Permits full connectivity but minimizes virtual circuits.
C. Lets traffic cross an X.25 network only once.
D. Must be used to solve split horizon issues.
Answer: B
642-871
Actualtests.com - The Power of Knowing


QUESTION 15 Out-of-band call setup is accomplished in Strata COM environments by ______.
A. The Intelligent Network Server (INS).
B. Soft PVCs.
C. Fast Packet call setup protocol.
D. Signaling System 7 (SS7).
Answer: A

QUESTION 16 NetBIOS end stations use names to communicate with servers. Device names on the network
are learned through extensive use of ______.
A. ARP request.
B. Static mapping.
C. Data-link layer broadcasts.
D. DHCP servers.
Answer: C

QUESTION 17 At what layer does ZIP work?
A. Application

B. Network
C. Transport
D. Session
E. Data Link
Answer: D

QUESTION 18 If you have SNA clients, the mainframe, and the FEP all in the same location and only one
path to the FEP, which of the following could you use?
A. APPN
B. Proxy Explorer
C. RSRB
D. DLSW
Answer: B

QUESTION 19 Which of the following features would most likely be implemented on a router at the access
layer in the hierarchical design model?
A. Header, link, and payload compression.
B. Filtering by area, network, and zone.
C. Proxy services.
D. Optimized wide-area transport.
Answer: C

QUESTION 20 In a SNA network with RSRB, TCP encapsulation is used for LOCAL ACK to ______.
A. Determine subnet scopes.
B. Determine distance to gateway.
C. Integrate UNIX support.
D. Ensure guaranteed delivery.
Answer: D
642-871
Actualtests.com - The Power of Knowing



QUESTION 21 A multiport router with one LAN and several WAN connections would be used for ______.
A. A small home/office with a few users.
B. Very secure connections.
C. Remote gateway applications only.
D. Power users in hotel rooms.
Answer: C

QUESTION 22 When gathering data for a new internet work design, you should:
A. Develop an understanding of business information flow.
B. Develop the internet work structure and topology.
C. Pay no regard to corporate politics.
D. Configure internetworking devices.
Answer: A

QUESTION 23 What are the two Internet work design goals that most often are a tradeoff?
A. Designing a scalable network and maximizing network availability.
B. Meeting the customer's business requirements and maximizing network availability.
C. Keeping the costs down and maximizing network availability.
D. Using state-of-art solutions and maximizing network availability.
Answer: C
Explanation: Basic trade-off in network design is cost versus availability
Reference: The Cisco Internet work Design Version 3 courseware, P 1-4 in the slide

QUESTION 24 Major network numbers are subnetted, at a fixed length, to provide:
A. Greater administrative control of traffic.
B. A greater number of hosts per segment.
C. Better utilization of addressing space.
D. An easy conversion between binary and decimal numbers.

Answer: C
Explanation: Subnetting gives more network addresses.
Incorrect Answers
A: This cannot be correct. How does subnetting at fixed length give you greater administrative control? VLSM
gives you greater control
B: Subnetting in a fixed length is that it was done when the internet grew beyond 254 networks and a way had
to be found to get a higher number of networks.
D: Ridiculous.

QUESTION 25 Which of the following items is not a consideration when selecting a routing protocol for an
internet work?
A. The complexity of converting from the current routing protocol.
B. The ability to support variable length subnet masking.
C. The ability to support a wide variety of user applications.
D. The time for the network o converge after a topology change.
Answer: C

642-871
Actualtests.com - The Power of Knowing

QUESTION 26 When estimating bandwidth used by a routing protocol, which of the following questions is
least relevant?
A. What path metrics are supported?
B. How often are routing updates transmitted?
C. What data is transmitted in routing updates?
D. Is snapshot routing supported?
Answer: A

QUESTION 27 Variable-length subnetting:
A. Permits a subnet mask that does not have the standard 32-bit length.

B. Is best designed by further subnetting one regular subnet.
C. Is not usually used in serial links.
D. Is recommended so that you can have numerous subnet masks for a given network.
Answer: D

QUESTION 28 Which factor involved in network design controls how security is implemented?
A. Product availability.
B. Policy.
C. Bandwidth requirements.
D. Performance.
Answer: B

QUESTION 29 Redundant SNA front-end processors
A. Must have different MAC addresses.
B. Let a user's workstation send requests to either front-end processor during an established session.
C. Provide redundancy and load balancing on a connection-by-connection basis.
D. Can have the same MAC address when connected to the same Token Ring network.
Answer: C

QUESTION 30 When using the Internet as a remote access methods:
A. Each organization has a virtual private network implemented by a tunneling protocol.
B. All organizations share a single virtual private network using the layer-2 forwarding protocol.
C. A virtual private network is created using IP routing protocols and a GRE tunnel.
D. The user simply accesses the private corporate network through a domain name.
Answer: A

QUESTION 31 In remote access designs, the four main concerns are
A. Availability, cost, speed, distance.
B. Cost, applications, speed, distance.
C. Distance, speed, modem type, and cost.

D. End-station type, cost, availability, speed.
Answer: A

QUESTION 32 Multilink PPP allows aggregation of B-channels by
A. Segmentation and sequencing of packets through an additional four type field added to the header.
B. Segmentation and sequencing of packets through an additional two type field added to the header.
642-871
Actualtests.com - The Power of Knowing

C. Segmentation and sequencing of packets through a user configurable field added to the header.
D. Segmentation and sequencing of packets through a method to be determined.
Answer: A

QUESTION 33 A remote user that typically dials in from a hotel room
A. Is a classified as an occasional telecommuter or mobile user and would typically use analog dial-in lines.
B. Is classified as a dedicated telecommuter or mobile user and would typically use analog dial-in lines.
C. Is classified as an occasional telecommuter or mobile user and would typically use ISDN dial-in lines.
D. Is classified as an dedicated telecommuter or mobile user and would typically use ISDN dial-in lines.
Answer: A
Explanation: As per the Cisco Internet work Design version 3.0 courseware, P 19-14 "Occasional telecommuter
or mobile users are those who need infrequent dial in access to the enterprise network. And example might be
the mobile user on the road who dial in to the enterprise network in the morning an evening to check e-mail or
to access corporate database information throughout the day". This user in the hotel room is clearly a
Occasional Telecommuter.

QUESTION 34 Which of the following is a major issue in a large Novell NetWare network that uses a full-
mesh Frame Relay topology?
A. Split horizon cannot be turned off.
B. SAP broadcasts use a substantial amount of bandwidth.
C. Snapshot routing is not yet supported to reduce bandwidth usage by RIP.

D. Servers do not comply with the Committed Information Rate.
Answer: B

QUESTION 35 Which protocol does the Remote Access Server feature of Windows NT use as its
encapsulation method on WAN links?
A. HDLC
B. PPP
C. LAPB
D. SLIP
Answer: B

QUESTION 36 What additional benefits are realized by network designs that employ the Internet DNS model
of translating a NetBIOS name to an IP address?
A. Bandwidth utilization is improved because broadcast traffic is reduced.
B. Latency for the name translation is reduced because functionality is distributed amongst different servers.
C. The amount of administrative overhead is reduced because an internet DNS server understands NetBIOS
names and IP addresses that were either statically or dynamically assigned.
D. Latency for the name translation is reduced because functionality is centralized into one server.
Answer: A

QUESTION 37 The Windows Internet Name service method of name resolution uses ________ addresses to
enable clients to dynamically register NetBIOS names and to browse the network.
A. Broadcast
B. Multicast
C. Unicast

×